共 50 条
- [5] Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment [J]. Wireless Personal Communications, 2021, 116 : 3039 - 3060
- [6] The master key: A private authentication approach for pervasive computing environments [J]. PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 212 - +
- [7] Active Authentication for pervasive computing environments [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 28 - 41
- [8] Uncertainty assessment in access control of pervasive computing environments [J]. 2012 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2012, : 1174 - 1179
- [9] Privacy Enhanced Access Control in Pervasive Computing Environments [J]. 2ND INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS (BROADNETS 2005), 2005, : 384 - +
- [10] Trust-based security in pervasive computing environments [J]. COMPUTER, 2001, 34 (12) : 154 - 157